A Method for User Data Protection Based on Game Theory in Cloud Computing

Size: px
Start display at page:

Download "A Method for User Data Protection Based on Game Theory in Cloud Computing"

Transcription

1 , pp A Method for User Data Protection Based on Game Theory in Cloud Computing Xiaohui Li 1, Feng Liu 2, Hongxing Liang 3 1 College of Electrical and Information Engineer, Liaoning University of Technology Jinzhou, Liaoning, , China 2 Shenyang institute of computing technology, Chinese academy of sciences Shenyang, Liaoning, , China 3 Jinzhou Force, Jinzhou, Liaoning , China 1 lixiaohui@ s.bjut.edu.cn Abstract. To protect the security of user data and a safe, controlled service acquisition as the goal, we propose a game service acquisition method which combines trust evaluation with decision management application, designing user-centric data protection restraint mechanisms with mechanism design theory. The method includes user information, trust management, service discovery, service management and revenue information function module. Trust reconciles contradiction between user data protection and cloud services honest offering so that both sides of service reach the perfect Bayesian Nash equilibrium strategies to promote the honest service implementation. Keywords: cloud computing; game theory; data protection 1 Introduction Cloud computing environments due to their specific service delivery exist between cloud users and cloud services with data transfer of ownership, the separation of ownership and control of data, this competitive relationship with economic phenomena have similarities. Therefore, this paper attempts to use game theory and other related tools to solve the corresponding problem. In the cloud service interaction process, cloud users trust evaluation of cloud services, cloud users when faced with multiple service resources, it will be trusted to assess the behavior of their services, if the assessment of credibility, then choose to submit a request, otherwise select other services, empathy cloud services cloud users have to make trust assessments to ensure the safety of the service side, consider cloud from the perspective of the user data protection point of this program is mainly focused on cloud services cloud users trust management. We will interact with the service cloud computing environments as cloud game problems between users and cloud services, cloud services from the perspective of trust evaluation interaction, trust cloud services as a measure of the benefit or payment game party, demonstrate cloud cloud computing environment customer service requests and cloud services is a dynamic game of incomplete information. Game cloud service model proposed acquisition, the program to achieve cloud data ISSN: ASTL Copyright 2017 SERSC

2 security and user privacy protection as the goal, trust management focus, trust mechanisms by providing customized protection services on demand cloud users on this basis. Game theory is used to establish trust between cloud users and cloud services, trust services based on both the refined Bayesian Nash equilibrium strategies designed to promote service integrity cooperation incentives. The rest of this paper is organized as follows. In Section 2, we analysis Game relationship in the cloud environment and related information. In Section 3, we details the method design in two aspects: one is to design ideas and the other is specific program. We also give a specific module implementation for better illustration of our method. Finally, we conclude this paper in Section 4. 2 Cloud Service Game Analysis 2.1 Game Theory Game theory began in 1944 by Von Neumann and Oskar Morgenstern in cooperation with the publication of "Game Theory and Economic Behavior". Nash and Tucker in the 1950s, published an article on the definition and existence of equilibrium, and proposed a "prisoner's dilemma", both of which work laid the cornerstone of the noncooperative game theory [1-4]. Game theory is a problem with this decision and balanced decision-making body of behavioral research more interaction with each other, which emphasizes the interdependence of the parties to the policy decision-making Any one subject must determine their own optimal strategy considering other subjects on the basis of selection strategy. In this sense, game theory is also known as "game theory." Game theory is the essence of the subject must be considered the basis of other body reactions up to choose their own course of action, the results of the game is to produce a balanced, balanced combination of all people who participate in the optimal strategy or action. The main problem in game theory is the study participants with independent interests and rational basis, under certain rule conditions, predict the behavior of other participants and the results of their behavior types (such as cooperation, betrayal, etc.) obtained by comparing, and then decide what action strategies, and ultimately achieve an equilibrium solution of mutual restraint. 2.2 Mechanism Design Theory Mechanism design theory study under freedom of choice, the conditions of incomplete information, design a theoretical mechanism to achieve the objectives set, which can be seen as the integrated use of game theory and social choice theory. In other word, the mechanism designs to provide an incentive to choose their own private information members of society problem analytical framework to consider what kind of game in the form of construction, making the solution of this game is that social Copyright 2017 SERSC 17

3 goals. Social goals here refers to the selection result of the entire social groups, by the players choice by expressing their preferences concluded that the results will in turn affect the choice of each individual players, if the result is a society of social choice result set, places Multi-functions social choice rule indicates [5-8]. 2.3 Dynamic Service Game Analysis Cloud computing is a huge cloud service network composed by a parallel grid, computing power through virtualization technology extension service cloud. Front-end user interface permits the user to select the service through the service catalog, service request and after verification by the system manager to find alternative service resources to select a service in the cloud resource is then provided by the service tool [9]. Cloud computing system logical structure shown in Figure 1. In the cloud computing service interaction environments, from between the cloud user data security and privacy protection angle cloud users and cloud services there are different interests and needs: Cloud user as a cloud service requester, choose a trusted service provider, protection while their rights to obtain services revenue; cloud services as a service provider is to provide the amount of its income. Both hope to eventually achieve a balanced state of mutual restraint results in providing information and services to get the room, so the interactive services cloud computing environment is the behavior of both sides of the game.... User interface System Management Monitoring and Statistics Services Directory Fig. 1. Cloud computing system logical structure 3. Method Design In a cloud computing environment cloud user data protection security program primarily consists of two parts: the trust evaluation and trust-based decision management. The main job is to assess the safety of trust from the cloud services provided to de- 18 Copyright 2017 SERSC

4 scribe the relationship and trust quantify cloud computing environment of trust; Decision management mainly work is service options based on trust, including service discovery, selection and delivery of user data with trusted cloud balance relationship between the user and the service to obtain the release of data for controllable cloud services. To protect the security of user data cloud to cloud services provide a safe and controlled as the goal, the trust portfolio assessment and decision management application, designed to promote the application of mechanism design theory for data protection in the cloud user restraint mechanism center. 3.1 Design Ideas In the course of cloud computing environments in interactive services, cloud users what kind of approach allows to provide a safe and reliable cloud services, safety and security of user data is the core problem. Cloud users as a resource owner, cloud services as a controller of resources, in this sense we principal economics - agent theory to analyze the interaction occurring in the course of service problems and solutions, problems include interest conflict and asymmetric information.trust in the cloudbased service acquisition for analysis, used to calculate the credibility and trust cloud services directly belong to the history of trust and other information prior information on cloud services cloud user feedback evaluation belong posteriori information. trust based service interaction Game process as shown in Figure 2: Cloud services directly trust Cloud Services recommendation trust Priori information Cloud Services Trust quantification Service Discovery Dynamic Decision Correction of Information Service Selection Service behavior feedback Posteriori information Fig. 2. Service selection game information based on trust 3.2 Cloud Users Data Protection Method based on Game In a cloud computing environment to the cloud computing user demand for services - safe and controlled as a starting point, to trust the main line, the introduction of the Copyright 2017 SERSC 19

5 game and restraint mechanisms proposed cloud user data protection solutions. The scenario in the game under restraint mechanism, so that the integrity of the service provider to implement cloud services, through the cloud service node trust evaluation, both for service interaction and user security decisions to provide more detailed and accurate basis. (1) Information Management: including a priori and a posteriori information management information, feedback and historical behavior is mainly historical service management cloud services provide statistical and other information, is updated via the information corrected cloud user services provide the basis for selection; (2) Service Trust Evaluation: First cloud users describe the service description trust, trust quantification of cloud services based on a priori information; (3) Service selection: trust-based service discovery and service selection, as a cloud user's final earnings; (4) User Data Delivery: User data disclosure mode based on trust, the introduction of trust threshold concept triggering cloud service constraints and incentives. (5) Cloud User Decision Management: service selection and user data delivery, in the process of service game interative, cloud users according to Decision Management make the choice of trust threshold and trust management results to deliver data, triggering cloud services restraint mechanism, dynamic management service trust value. In a cloud computing environment, there are between cloud users interact with cloud services over the game, after the process may never again their choice, called the basic game, if we choose the cloud service is called repeated games, repeated games behavior and results are not necessarily duplicate the basic game is simple, because the information side of the game will return information changes, so that the choice game behavior is affected. In repeated games, if fraud occurs, the game process will thus loss of revenue, so participants must fully consider the long-term benefits, rather than choose immediate. In this case, the two sides will conduct cooperation agreement on the formation of constraints. In repeated games, punishment mechanism is often used to trigger strategies, both players find each other once the first tentative cooperation fraudulent or malicious behavior, you are no longer together. Therefore, according to the punishment trigger strategies can contribute to long-term choice between nodes acts to maintain the integrity of the biggest benefits of cooperation. Cloud services are the actors, it is a rational choice of strategy, seeking to maximize returns. Compliance triggering policy, when a malicious service provider, the cooperation will always terminate that application posteriori information feedback, correction of the assessed value of the trust cloud services or increase their choice of trust threshold. Since the cloud user is the later actor in the game, for the cloud service request, based on a priori information needed for cloud services, authorization or refusal to make choices. If the cloud is the first choice of the service user, assuming a priori information is directly assess the value of the trust, the application of trust evaluation methods to assess the value of the service provider trust T [0,1], and when trust of its assessed valuet, cloud users to take selection strategy, otherwise refused; where [0,1] is the setting for cloud services are chosen to trust threshold. If the cloud service is already offered in good faith through service, then do not have to trust 20 Copyright 2017 SERSC

6 this assessment, direct selection, until after the implementation of non-faith service cloud service providers, will never accept their services. Cloud service is the pioneer in the game, it is a rational choice of strategy, seeking to maximize returns. Compliance triggering policy, after a malicious service providing, the cooperation will always terminate that application posteriori information feedback, correction cloud services assessed trust value T 0 or increase trust threshold For cloud services can provide honest service design constraint mechanism is as follows: If a malicious cloud service providers, cloud users will never get the choice to apply; cloud service is honest while providing services, applications, representing because of this honest service offer, the next time its earnings increasing. Dishonest service offered payoff: 1. S f Honest service offered payoff: (0,1] S _ Income S _ Income (1) d S c = S _ Income 1 When Sc Sf the honest cloud service provider will get more benefit. (2) ( Sd _ Income 2 S _ Income) ( S _ Income S _ Income) d (3) 4 Conclusion In this paper, we focus on user data protection issues in cloud computing, propose a Game based method to data protection, while dynamically generate trust relationship to release its own data to achieve balance of privacy protection and services provided,in which we define trust metrics as a dynamic and flexible process that offers a new perspective for decision-making. Firstly,from the perspective of game theory,we describe the interactive of a cloud services and cloud between users as behavior game, trust and decision-making (service selection) is important information for both games. Applying game constraints, incentives both to implement credible behavior. Then to introduce the various components of the method and give examples of partially implemented method. The analysis shows that the performance of our method is obvious and it can apply to cloud computing environment based on trust services acquisition and has guidance for cloud users to select specific service to achieve less privacy loss and more benefits. That high fraud costs make the services and users both sides to implementation faith conduct. This game method can effectively protect users' data and containment malicious service side, from another point of view, it is also beneficial to the security of the service side. Copyright 2017 SERSC 21

7 Acknowledgments The work in this paper has been supported by Liaoning Province Science and Technology Program (SY ). References 1. Deyi Li, Things cornerstone - Cloud Computing [J],Technology tide,2011, 5: ACM SIGCOMM Computer Communication Review, Volume 39, Number 1,2009, pp G. Owen, Game theory, Naval Postgraduate School: Monterey, California, S. Roy et al., A Survey of Game Theory as Applied to Network Security, in Proceedings of the 43rd Hawaii International Conference on System Sciences, pp. 1-10, I. K. Geckil and P. L. Anderson. Applied Game Theory and Strategic Behavior, Chapman & Hall/CRC Press, Yarui Chen,Liqin Tian.Cloud computing model and analysis based on user behavior under dynamic environment Game Theory [J], Journal of Electronic, 2011,39(8): Zhangsheng Bing, Cai Wandong, Li Yongjun. Social network access control method based on game theory [J], Northwestern Polytechnical University,2011,29(4): Tianli Qin, Lin Chuang. Trusted Network in an act of trust-based predictive control mechanisms Game [J], Journal of Computers,2007,30(11): Kuang Sheng Hui, Li Bo cloud computing architecture and application examples analysis [J], Computer and Digital Engineering, Zhang Qiang, Liu Qiang, linear assignment method to improve and Bernardo Study [J]. Industrial Engineering and Management,2009,(1): Xiaohui Li, Jingsha He, Ting Zhang. A service-oriented identity authentication privacy protection method in cloud computing. International Journal of Grid and Distributed Computing, 2013, 6(1): Copyright 2017 SERSC

Using Game Theory to analyze Risk to Privacy. Lisa Rajbhandari Einar A. Snekkenes

Using Game Theory to analyze Risk to Privacy. Lisa Rajbhandari Einar A. Snekkenes Using Game Theory to analyze Risk to Privacy Lisa Rajbhandari Einar A. Snekkenes Agenda Introduction Background Issues focused on this paper Why Game Theory? A privacy scenario Limitations Conclusion 2

More information

Recommendation-based trust model in P2P network environment

Recommendation-based trust model in P2P network environment Recommendation-based trust model in P2P network environment Yueju Lei, Guangxi Chen (Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology, Guilin 541004, China) chgx@guet.edu.cn,

More information

Chapter 15 Oligopoly

Chapter 15 Oligopoly Goldwasser AP Microeconomics Chapter 15 Oligopoly BEFORE YOU READ THE CHAPTER Summary This chapter explores oligopoly, a market structure characterized by a few firms producing a product that mayor may

More information

Oligopolies Part III

Oligopolies Part III Oligopolies Part III It's called an oligopoly. It's not a regular market. It's a market in which they control the prices and they've been doing it for years. Richard Miller The Prisoner s Dilemma Consider

More information

Modeling the Personal Data Ecosystem: Business and Policy Scenarios ID3. (C) John H.. Clippinger

Modeling the Personal Data Ecosystem: Business and Policy Scenarios ID3. (C) John H.. Clippinger Modeling the Personal Data Ecosystem: Business and Policy Scenarios ID3 (C) John H.. Clippinger A WEF View of Personal Data Personal Data Ecosystem Marketers Banks DATA USERS Media Affiliates Information

More information

Principles of Microeconomics Assignment 8 (Chapter 10) Answer Sheet. Class Day/Time

Principles of Microeconomics Assignment 8 (Chapter 10) Answer Sheet. Class Day/Time 1 Principles of Microeconomics Assignment 8 (Chapter 10) Answer Sheet Name Class Day/Time Questions of this homework are in the next few pages. Please find the answer of the questions and fill in the blanks

More information

KEY SUCCESS FACTORS FOR MAJOR PROGRAMS THAT LEVERAGE IT. The 7-S for Success Framework

KEY SUCCESS FACTORS FOR MAJOR PROGRAMS THAT LEVERAGE IT. The 7-S for Success Framework KEY SUCCESS FACTORS FOR MAJOR PROGRAMS THAT LEVERAGE IT The 7-S for Success Framework May 2014 This document sets forth a framework of critical success factors for large scale government IT projects. ACT-IAC

More information

Microeconomics LESSON 6 ACTIVITY 40

Microeconomics LESSON 6 ACTIVITY 40 Microeconomics LESSON 6 ACTIVITY 40 Monopolistic Competition Figure 40.1 Monopolistically Competitive Firm in the Short Run MC COSTS/REVENUE (DOLLARS) E D C B A F H K G ATC D 0 MR L M QUANTITY 1. Use Figure

More information

Research on e-commerce logistics system informationization in Chain

Research on e-commerce logistics system informationization in Chain Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Scien ce s 96 ( 2013 ) 838 843 13th COTA International Conference of Transportation Professionals (CICTP 2013) Research

More information

Study on Predictive Maintenance Strategy

Study on Predictive Maintenance Strategy , pp.52-56 http://dx.doi.org/10.14257/astl.2016.137.10 Study on Predictive Maintenance Strategy Wang Hongxia, Ye Xiaohui, Yin Ming Naval University of Engineering, Wuhan 430033, China 25523224@QQ.com Abstract.

More information

Microeconomics LESSON 6 ACTIVITY 41

Microeconomics LESSON 6 ACTIVITY 41 Microeconomics LESSON 6 ACTIVITY 41 Game Theory Strategic thinking is the art of outdoing an adversary, knowing that the adversary is trying to do the same to you. Dixit and Nalebuff Game theory is used

More information

How Open Source Communities to do Standardization

How Open Source Communities to do Standardization www.huawei.com How Open Source Communities to do Standardization Li Li (Thomas), thomas.lili@huawei.com VP of Standardization & Industry For LinuxCon + ContainerCon + CloudOpen China, 19-20 June 2017,

More information

Research and Application Study on Accident-Based 3D Power Station Simulation Technology

Research and Application Study on Accident-Based 3D Power Station Simulation Technology International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) Research and Application Study on Accident-Based 3D Power Station Simulation Technology Tie Li, Xiaoming

More information

Chapter 9: Static Games and Cournot Competition

Chapter 9: Static Games and Cournot Competition Chapter 9: Static Games and Cournot Competition Learning Objectives: Students should learn to:. The student will understand the ideas of strategic interdependence and reasoning strategically and be able

More information

Research on Investment, Financing and Financial Management of Small and Medium-sized Enterprises Jiafeng Wan

Research on Investment, Financing and Financial Management of Small and Medium-sized Enterprises Jiafeng Wan 2nd International Conference on Education, Management and Information Technology (ICEMIT 2015) Research on Investment, Financing and Financial Management of Small and Medium-sized Enterprises Jiafeng Wan

More information

Chapter 13 Outline. Challenge: Intel and AMD s Advertising Strategies. An Overview of Game Theory. An Overview of Game Theory

Chapter 13 Outline. Challenge: Intel and AMD s Advertising Strategies. An Overview of Game Theory. An Overview of Game Theory Chapter 13 Game Theory A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes. You can t outrun a bear, scoffs the camper. His friend coolly replies, I don

More information

A Finance Logistics Management Platform Based on Collaboration Management

A Finance Logistics Management Platform Based on Collaboration Management , pp.37-41 http://dx.doi.org/10.14257/astl.2014.48.07 A Finance Logistics Management Platform Based on ZhongDai Wu 1, MingHai Ye 1, Mei Li 1, Jin Liu 2 1. School of Economics Management, Tongji University,

More information

McKinsey BPR Approach

McKinsey BPR Approach McKinsey BPR Approach Kai A. Simon Viktora Institute 1General aspects Also McKinsey uses a set of basic guiding principles, or prerequisites, which must be satisfied in order to achieve reengineering success.

More information

The Game Analysis about Government-Industry-University-Institute Alliance of Competitive Intelligence

The Game Analysis about Government-Industry-University-Institute Alliance of Competitive Intelligence International Journal of Business and Social Science Vol. 5, No. 7; June 2014 The Game Analysis about Government-Industry-University-Institute Alliance of Competitive Intelligence Tingting Dai Shanghai

More information

A More Intelligent Network Sharing More Intelligent Information

A More Intelligent Network Sharing More Intelligent Information A More Intelligent Network Sharing More Intelligent Information 1. Introduction: The Department of Defense is more dependent on information sharing than ever before. Distributed decision-making is the

More information

5 Market Games For Teaching Economics

5 Market Games For Teaching Economics 5 Market Games For Teaching Economics Progression 5 Market Games from website economics-games.com To be played separately or as a sequence: Market Game 1: Sunk costs, monopoly, and introduction to the

More information

AQA Economics A-level

AQA Economics A-level AQA Economics A-level Microeconomics Topic 5: Perfect Competition, Imperfectly Competitive Markets and Monopoly 5.5 Oligopoly Notes Characteristics of an oligopoly: High barriers to entry and exit There

More information

Strategies to Improve the Efficiency of Chinese Agricultural Products Circulation

Strategies to Improve the Efficiency of Chinese Agricultural Products Circulation International Conference on Economic Management and Trade Cooperation (EMTC 2014) Strategies to Improve the Efficiency of Chinese Agricultural Products Circulation De-Shu KONG 1,2,a, Cheng-Bo HU 3,b,*

More information

Oligopoly Pricing. EC 202 Lecture IV. Francesco Nava. January London School of Economics. Nava (LSE) EC 202 Lecture IV Jan / 13

Oligopoly Pricing. EC 202 Lecture IV. Francesco Nava. January London School of Economics. Nava (LSE) EC 202 Lecture IV Jan / 13 Oligopoly Pricing EC 202 Lecture IV Francesco Nava London School of Economics January 2011 Nava (LSE) EC 202 Lecture IV Jan 2011 1 / 13 Summary The models of competition presented in MT explored the consequences

More information

Oligopoly is a market structure in which Natural or legal barriers prevent the entry of new firms. A small number of firms compete.

Oligopoly is a market structure in which Natural or legal barriers prevent the entry of new firms. A small number of firms compete. CHAPTER 15: OLIGOPOLY What Is Oligopoly? Oligopoly is a market structure in which Natural or legal barriers prevent the entry of new firms. A small number of firms compete. Barriers to Entry Either natural

More information

Course Outline. Business Undeclared School of Business & Economics ECON Applied Microeconomics for Sustainable Management

Course Outline. Business Undeclared School of Business & Economics ECON Applied Microeconomics for Sustainable Management Course Outline Calendar Description Business Undeclared School of Business & Economics ECON 6020-3.00 Applied Microeconomics for Sustainable Management Students examine more advanced microeconomic tools

More information

The Research of Middleware Architecture of Intelligent Logistics System Based on SOA

The Research of Middleware Architecture of Intelligent Logistics System Based on SOA American Journal of Software Engineering and Applications 2015; 4(6): 115-120 Published online October 23, 2015 (http://www.sciencepublishinggroup.com/j/ajsea) doi: 10.11648/j.ajsea.20150406.13 ISSN: 2327-2473

More information

Microgrid Modelling and Analysis Using Game Theory Methods

Microgrid Modelling and Analysis Using Game Theory Methods Microgrid Modelling and Analysis Using Game Theory Methods Petros Aristidou, Aris Dimeas, and Nikos Hatziargyriou School of Electrical and Computer Engineering National Technical University of Athens Zografou

More information

FOUR MARKET MODELS. Characteristics of Oligopolies:

FOUR MARKET MODELS. Characteristics of Oligopolies: FOUR MARKET MODELS Perfect Competition Monopolistic Competition Oligopoly Pure Monopoly Characteristics of Oligopolies: A Few Large Producers (Less than 10) Identical or Differentiated Products High Barriers

More information

Game Theory Methods in Microgrids

Game Theory Methods in Microgrids Game Theory Methods in Microgrids Petros Aristidou, Aris Dimeas, and Nikos Hatziargyriou School of Electrical and Computer Engineering National Technical University of Athens Zografou Campus 15780 Athens

More information

Chapter 13. Game Theory. Gaming and Strategic Decisions. Noncooperative v. Cooperative Games

Chapter 13. Game Theory. Gaming and Strategic Decisions. Noncooperative v. Cooperative Games Chapter 13 Game Theory Gaming and Strategic Decisions Game theory tries to determine optimal strategy for each player Strategy is a rule or plan of action for playing the game Optimal strategy for a player

More information

Use the following to answer question 4:

Use the following to answer question 4: Homework Chapter 11: Name: Due Date: Wednesday, December 4 at the beginning of class. Please mark your answers on a Scantron. It is late if your Scantron is not complete when I ask for it at 9:35. Get

More information

Analytic Preliminaries for Social Acceptability of Legal Norms &

Analytic Preliminaries for Social Acceptability of Legal Norms & Analytic Preliminaries for Social Acceptability of John Asker February 7, 2013 Yale Law School Roadmap Build on case studies of environments where extra-legal norms are at least as important as formal

More information

PARTNERSHIP MARKETING: A NEW APPROACH TO ENSURE SUSTAINABILITY IN A DIGITAL LIBRARY by Hilda Kriel

PARTNERSHIP MARKETING: A NEW APPROACH TO ENSURE SUSTAINABILITY IN A DIGITAL LIBRARY by Hilda Kriel 1 PARTNERSHIP MARKETING: A NEW APPROACH TO ENSURE SUSTAINABILITY IN A DIGITAL LIBRARY by Hilda Kriel 1. INTRODUCTION Sustainability is one of the biggest challenges facing libraries in the digital era.

More information

Game theory (Sections )

Game theory (Sections ) Game theory (Sections 17.5-17.6) Game theory Game theory deals with systems of interacting agents where the outcome for an agent depends on the actions of all the other agents Applied in sociology, politics,

More information

Research on the Influence of WOM on Consumer Decisions

Research on the Influence of WOM on Consumer Decisions , pp.217-223 http://dx.doi.org/10.14257/astl.2015.111.42 Research on the Influence of WOM on Consumer Decisions Fei Meng 1, Jianliang Wei 2, Qinghua Zhu 3 1 Department of Public Foundation, Zhejiang Police

More information

AMR Data Hub. Architecture. Work Package 6.1.5: Enterprise Application Implementation Scenarios for Electricity Market

AMR Data Hub. Architecture. Work Package 6.1.5: Enterprise Application Implementation Scenarios for Electricity Market AMR Data Hub Architecture Work Package 6.1.5: Enterprise Application Implementation Scenarios for Electricity Market This work was carried out in the Smart Grids and Energy Markets (SGEM) research program

More information

Reputation-based trust management systems and their applicability to grids

Reputation-based trust management systems and their applicability to grids Reputation-based trust management systems and their applicability to grids Gheorghe Cosmin Silaghi 1, Alvaro E. Arenas 1, Luis Moura Silva 2 1 {g.c.silaghi, a.e.arenas}@rl.ac.uk CCLRC, Rutherford Appleton

More information

Genetic Algorithms-Based Model for Multi-Project Human Resource Allocation

Genetic Algorithms-Based Model for Multi-Project Human Resource Allocation Genetic Algorithms-Based Model for Multi-Project Human Resource Allocation Abstract Jing Ai Shijiazhuang University of Applied Technology, Shijiazhuang 050081, China With the constant development of computer

More information

Problems and Prospects of CSR System Development in China

Problems and Prospects of CSR System Development in China Problems and Prospects of CSR System Development in China Jie Wang Zhuhai Campus, Beijing Institute of Technology 6 Jin Feng Road, Tang Jia Wan, Zhuhai 519085, China & School of Management, Dalian Polytechnic

More information

Games and Strategic Behavior. Chapter 9. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

Games and Strategic Behavior. Chapter 9. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Games and Strategic Behavior Chapter 9 McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 1. List the three basic elements of a game. Recognize

More information

The Antecedents and Consequences of Customer Trust and Website Image: The Moderating Effects of Gender

The Antecedents and Consequences of Customer Trust and Website Image: The Moderating Effects of Gender , pp.29-33 http://dx.doi.org/10.14257/astl.2015.102.07 The Antecedents and Consequences of Customer Trust and Website Image: The Moderating Effects of Gender Ki Han Chung 1, Yan Qing Zhang 2, Yu Hui Dong

More information

A Reliable Trust Model for Grid Based on Reputation

A Reliable Trust Model for Grid Based on Reputation A Reliable Trust Model for Grid Based on Reputation Vivekananth.p Lecturer-IT Department St Joseph College of Engineering and Technology Dar-Es-Salaam, Tanzania vivek.jubilant@gmail.com Abstract- Grid

More information

How will you manage the impact of the Payment Services Directive 2?

How will you manage the impact of the Payment Services Directive 2? How will you manage the impact of the Payment Services Directive 2? By Edwin van der Molen, Michal Kalina, Bert Bouwmeester and Bernard Juffermans April 2017 What is your strategy? The topic of this white

More information

profitability in business systems BSS consolidation and harmonization Your business technologists. Powering progress

profitability in business systems BSS consolidation and harmonization Your business technologists. Powering progress profitability in business systems BSS consolidation and harmonization Your business technologists. Powering progress Value Through Efficiency After years of technology innovation and IP transformation,

More information

The Optimal Decisions of the Company + Farmer Contract-Farming Supply Chain With Nash Bargain Fair Reference

The Optimal Decisions of the Company + Farmer Contract-Farming Supply Chain With Nash Bargain Fair Reference Management Science and ngineering Vol. 1, No. 1, 16, pp. 8-13 DOI:1.3968/813 ISSN 1913-341 [Print] ISSN 1913-35X [Online] www.cscanada.net www.cscanada.org The Optimal Decisions of the Company + armer

More information

ECON December 4, 2008 Exam 3

ECON December 4, 2008 Exam 3 Name Portion of ID# Multiple Choice: Identify the letter of the choice that best completes the statement or answers the question. 1. A fundamental source of monopoly market power arises from a. perfectly

More information

ericsson White paper GFMC-17: Uen October 2017 TELECOM IT FOR THE DIGITAL ECONOMY

ericsson White paper GFMC-17: Uen October 2017 TELECOM IT FOR THE DIGITAL ECONOMY ericsson White paper GFMC-17:000619 Uen October 2017 TELECOM IT FOR THE DIGITAL ECONOMY Introduction The rapidly expanding digital economy has exposed a clear gap in both the architecture and operational

More information

Talent Education Path Under "One Belt and One Road" Horizon. Lin Zhang

Talent Education Path Under One Belt and One Road Horizon. Lin Zhang International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Talent Education Path Under "One Belt and One Road" Horizon Lin Zhang Guangzhou Sports Polytechnic, Guangzhou

More information

Reliability Analysis of the Railway Time Synchronization Network Based on Bayesian

Reliability Analysis of the Railway Time Synchronization Network Based on Bayesian , pp.59-72 http://dx.doi.org/10.14257/ijca.2015.8.10.06 Reliability Analysis of the Railway Time Synchronization Network Based on Bayesian Youpeng Zhang, Feng Wang, Shan Zhang and Li Lan School of Automation

More information

A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems

A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems Bader Ali School of Computer Science McGill University Montreal, QC H3A 2A7, Canada Email: bali2@cs.mcgill.ca Muthucumaru Maheswaran

More information

14.01 Principles of Microeconomics, Fall 2007 Chia-Hui Chen November 7, Lecture 22

14.01 Principles of Microeconomics, Fall 2007 Chia-Hui Chen November 7, Lecture 22 Monopoly. Principles of Microeconomics, Fall Chia-Hui Chen November, Lecture Monopoly Outline. Chap : Monopoly. Chap : Shift in Demand and Effect of Tax Monopoly The monopolist is the single supply-side

More information

AP Microeconomics Review Session #3 Key Terms & Concepts

AP Microeconomics Review Session #3 Key Terms & Concepts The Firm, Profit, and the Costs of Production 1. Explicit vs. implicit costs 2. Short-run vs. long-run decisions 3. Fixed inputs vs. variable inputs 4. Short-run production measures: be able to calculate/graph

More information

PRICE OF ANARCHY: QUANTIFYING THE INEFFICIENCY OF EQUILIBRIA. Zongxu Mu

PRICE OF ANARCHY: QUANTIFYING THE INEFFICIENCY OF EQUILIBRIA. Zongxu Mu PRICE OF ANARCHY: QUANTIFYING THE INEFFICIENCY OF EQUILIBRIA Zongxu Mu The Invisible Hand Equilibria and Efficiency Central to free market economics The Wealth of Nations (Smith, 1776) led by an invisible

More information

BLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform

BLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform BLOCKCHAIN CLOUD SERVICE Your Business Network with the Blockchain Platform Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud

More information

The Influential Factors of Organization Adoption of Egovernment Cloud

The Influential Factors of Organization Adoption of Egovernment Cloud 2017 International Conference on Financial Management, Education and Social Science (FMESS 2017) The Influential Factors of Organization Adoption of Egovernment Cloud Wei Wang1, 3, a, Yiming Liu1, 3, b,

More information

Regional Collaborative Environmental Governance in Yangtze

Regional Collaborative Environmental Governance in Yangtze Brief for GSDR 2016 Update Regional Collaborative Environmental Governance in Yangtze River Delta, China Qinqi Dai, Yu Yang*, Department of Public Administration, Southeast University, Nanjing 210096,

More information

Service Identification: BPM and SOA Handshake

Service Identification: BPM and SOA Handshake Service Identification: Srikanth Inaganti & Gopala Krishna Behara Abstract Service identification is one of the first steps in the Service Oriented Development life cycle. This has been challenging to

More information

Application of BIM Based on Security in the Process of Engineering Construction

Application of BIM Based on Security in the Process of Engineering Construction Application of BIM Based on Security in the Process of Engineering Construction Weidong Wu, Chuxuan Ren, Yuhong Wang School of Civil Engineering and Architecture, SWPU, China Abstract In recent years,

More information

Enterprise IT application evaluation based on BP neural network in Tianjin city

Enterprise IT application evaluation based on BP neural network in Tianjin city Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):108-112 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Enterprise IT application evaluation based on BP

More information

CMSC 474, Introduction to Game Theory Analyzing Normal-Form Games

CMSC 474, Introduction to Game Theory Analyzing Normal-Form Games CMSC 474, Introduction to Game Theory Analyzing Normal-Form Games Mohammad T. Hajiaghayi University of Maryland Some Comments about Normal-Form Games Only two kinds of strategies in the normal-form game

More information

Changes of Clothing Distribution Logistics Management RFID Technology

Changes of Clothing Distribution Logistics Management RFID Technology Science Journal of Business and Management 2016; 4(3): 72-76 http://www.sciencepublishinggroup.com/j/sjbm doi: 10.11648/j.sjbm.20160403.12 ISSN: 2331-0626 (Print); ISSN: 2331-0634 (Online) Changes of Clothing

More information

Synergies between Risk Modeling and Customer Analytics

Synergies between Risk Modeling and Customer Analytics Synergies between Risk Modeling and Customer Analytics EY SAS Forum, Stockholm 18 September 2014 Lena Mörk and Ramona Klein Agenda 1 2 Introduction Modeling in the financial sector 3 4 5 Consequences from

More information

Enterprise Architecture: an ideal discipline for use in Supply Chain Management

Enterprise Architecture: an ideal discipline for use in Supply Chain Management Enterprise Architecture: an ideal discipline for use in Supply Chain Management Richard Freggi Senior Supply Chain Architect (TOGAF 9.1 certified level 2) HP Inc. Content Understanding Supply Chain Management

More information

CA Clarity Project & Portfolio Manager

CA Clarity Project & Portfolio Manager CA Clarity Project & Portfolio Manager Business Objects Universes for CA Clarity PPM Reference Guide v12.1.0 This documentation and any related computer software help programs (hereinafter referred to

More information

Improved Risk Management via Data Quality Improvement

Improved Risk Management via Data Quality Improvement Improved Risk Management via Data Quality Improvement Prepared by: David Loshin Knowledge Integrity, Inc. January, 2011 Sponsored by: 2011 Knowledge Integrity, Inc. 1 Introduction All too frequently, we

More information

( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################!

( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################! "$%&'% ( %)'* + " $%&'(&)*)')%&&+), " (&)*)')%&&+)(&-( "" (&)*)')%&&+)*)-.)/0 " (&)*)')%&&+)*)-.)/$1 + '%, - "%&&%. 0 /(.(.&%(&)*)'23-(&%2-+()'4 0 &%5&((&)*)'()-(/(&4 / 0$%'% 1 -+'(.-(6.(/(&6&-((26&3&-/*6/(&,

More information

IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.

IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. ACM CCECC Serving computing education communities since 1991. Information Technology Metrics IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. Lists appropriate

More information

Principles of Economics: Seminar 1 - Game Theory

Principles of Economics: Seminar 1 - Game Theory Principles of Economics: Seminar 1 - Game Theory July 18, 2017 Principles of Economics: Seminar 1 - Game Theory July 18, 2017 1 / 20 What is a game? Definition: A game is any situation involving two or

More information

Research on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case

Research on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case 3rd International Conference on Management Science and Management Innovation (MSMI 2016) Research on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case

More information

Why Roadmapping Software is Key to New Product Innovation Success

Why Roadmapping Software is Key to New Product Innovation Success Why Roadmapping Software is Key to New Product Innovation Success For decades the linear innovation model reigned supreme. New product ideas began in the R&D realm, which fed into development, then production,

More information

Risk analysis in performancebased regulation (PBR) of safety

Risk analysis in performancebased regulation (PBR) of safety Risk analysis in performancebased regulation (PBR) of safety Tony Cox April 14, 2016 1 Why PBR? PBR seeks to improve future outcomes by setting goals rather than by prescribing how to achieve them Emphasizes

More information

Australia and New Zealand Testing Board. Testing as a Service. Carol Cornelius ANZTB Capital Quality Consulting

Australia and New Zealand Testing Board. Testing as a Service. Carol Cornelius ANZTB Capital Quality Consulting Testing as a Service TaaS Carol Cornelius ANZTB Capital Quality Consulting Testing as a Service - Forrester Sourcing professionals are moving away from their historic emphasis on staff augmentation in

More information

Extra Credit. Student:

Extra Credit. Student: Extra Credit Student: 1. A glass company making windows for houses also makes windows for other things (cars, boats, planes, etc.). We would expect its supply curve for house windows to be: A. Dependent

More information

Architecture-led Incremental System Assurance (ALISA) Demonstration

Architecture-led Incremental System Assurance (ALISA) Demonstration Architecture-led Incremental System Assurance (ALISA) Demonstration Peter Feiler Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 [DISTRIBUTION STATEMENT A] This material

More information

Design and Implementation of Underground Mining Safety Production Management System

Design and Implementation of Underground Mining Safety Production Management System , pp.173-180 http://dx.doi.org/10.14257/ijsia.2013.7.6.18 Design and Implementation of Underground Mining Production Management System Jun Luo Civil and Environmental Engineering School, University of

More information

Laboratory Management Based on Internet of Things. Jianming Huang

Laboratory Management Based on Internet of Things. Jianming Huang Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on

More information

Preface. Chapter 1 Basic Tools Used in Understanding Microeconomics. 1.1 Economic Models

Preface. Chapter 1 Basic Tools Used in Understanding Microeconomics. 1.1 Economic Models Preface Chapter 1 Basic Tools Used in Understanding Microeconomics 1.1 Economic Models 1.1.1 Positive and Normative Analysis 1.1.2 The Market Economy Model 1.1.3 Types of Economic Problems 1.2 Mathematics

More information

Social Networking Goes Mobile

Social Networking Goes Mobile WHITEPAPER Social Networking Goes Mobile This whitepaper is an extract from: Mobile User Generated Content Dating, Social Networking & Personal Content Delivery 2008-2013 (Second Edition)... information

More information

#1: Monopolistic Competition

#1: Monopolistic Competition Answers: #1: Monopolistic Competition MC-1. d. All of the terms describe economically breaking even MC-2. c. Economic profits will attract competition MC-3. d. Economically breaking even means you just

More information

Optimization Design of Cold Roll-beating Experiment Device Based on ANSYS Workbench

Optimization Design of Cold Roll-beating Experiment Device Based on ANSYS Workbench , pp.125-130 http://dx.doi.org/10.14257/astl.2016. Optimization Design of Cold Roll-beating Experiment Device Based on ANSYS Workbench Fanzhi Wei, Mingshun Yang, Qilong Yuan Faculty of mechanical and precision

More information

The effects of carbon taxes on investments in Smart-Grids and consumer engagement

The effects of carbon taxes on investments in Smart-Grids and consumer engagement DEPARTMENT OF ECONOMICS, MANAGEMENT AND QUANTITATIVE METHODS The effects of carbon taxes on investments in Smart-Grids and consumer engagement E.C. Ricci 15 th Global Conference on Environmental Taxation

More information

Modeling of competition in revenue management Petr Fiala 1

Modeling of competition in revenue management Petr Fiala 1 Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize

More information

ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING

ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING SOFTWARE DEVELOPMENT ESTIMATION STRATEGIES Manage risk and expectations within your organization with credible, defensible estimates. Learn how

More information

Experiential Learning Through Classroom Experiments David Bowes, Southeastern Louisiana University Jay Johnson, Southeastern Louisiana University

Experiential Learning Through Classroom Experiments David Bowes, Southeastern Louisiana University Jay Johnson, Southeastern Louisiana University Experiential Learning Through Classroom Experiments David Bowes, Southeastern Louisiana University Jay Johnson, Southeastern Louisiana University ABSTRACT This paper describes classroom experiments in

More information

Edexcel (A) Economics A-level

Edexcel (A) Economics A-level Edexcel (A) Economics A-level Theme 3: Business Behaviour & the Labour Market 3.4 Market Structures 3.4.4 Oligopoly Notes Characteristics of an oligopoly: High barriers to entry and exit There are high

More information

NCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F

NCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F NCOVER ROI Analysis for Test Coverage Using NCover NCover P.O. Box 9298 Greenville, SC 29601 T 864.990.3717 F 864.341.8312 conversation@ncover.com www.ncover.com Table of Contents Executive Summary 2 Cost

More information

Operational Modeling: Informed solutions for complex problems

Operational Modeling: Informed solutions for complex problems Operational Modeling: Informed solutions for complex problems 16 th LCI Congress October 7-10, 2014 Our Big Idea Adapting standard practices from the semiconductor industry enables new techniques in design

More information

Best-response functions, best-response curves. Strategic substitutes, strategic complements. Quantity competition, price competition

Best-response functions, best-response curves. Strategic substitutes, strategic complements. Quantity competition, price competition Strategic Competition: An overview The economics of industry studying activities within an industry. Basic concepts from game theory Competition in the short run Best-response functions, best-response

More information

Building a Winning Business Case for HCM SaaS

Building a Winning Business Case for HCM SaaS Building a Winning Business Case for HCM SaaS Mark Bray, Principal Consultant ISG WHITE PAPER 2016 Information Services Group, Inc. All Rights Reserved INTRODUCTION The number of enterprises that experience

More information

SAMPLE MULTIPLE CHOICE FINAL EXAM CHAPTER 6 THE ANALYSIS OF COSTS

SAMPLE MULTIPLE CHOICE FINAL EXAM CHAPTER 6 THE ANALYSIS OF COSTS 1. SAMPLE MULTIPLE CHOICE FINAL EXAM CHAPTER 6 THE ANALYSIS OF COSTS Long-run average cost equals long-run marginal cost whenever a) the production function exhibits constant returns to scale. b) fixed

More information

APPROACHING GREEN MANUFACTURING IN IRON AND STEEL INDUSTRY

APPROACHING GREEN MANUFACTURING IN IRON AND STEEL INDUSTRY Int. J. Mech. Eng. & Rob. Res. 2013 Md. Salman Alvi et al., 2013 Review Article ISSN 2278 0149 www.ijmerr.com Vol. 2, No. 3, July 2013 2013 IJMERR. All Rights Reserved APPROACHING GREEN MANUFACTURING IN

More information

Revenue Models for Demand Side Platforms in Real Time Bidding Advertising

Revenue Models for Demand Side Platforms in Real Time Bidding Advertising 27 IEEE International Conference on Systems Man Cybernetics (SMC Banff Center Banff Canada October 5-8 27 Models for Dem Side Platforms in Real Time Bidding Advertising Rui Qin Xiaochun Ni Yong Yuan Juanjuan

More information

ITIL Intermediate Lifecycle Stream:

ITIL Intermediate Lifecycle Stream: ITIL Intermediate Lifecycle Stream: SERVICE TRANSITION CERTIFICATE Sample Paper 2, version 6.1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style Multiple Choice 90 minute paper Eight

More information

TechNavio Infiniti Research

TechNavio Infiniti Research TechNavio Infiniti Research http://www.marketresearch.com/infiniti Research Limited v2680/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday:

More information

Modeling of Agile Intelligent Manufacturing-oriented Production Scheduling System

Modeling of Agile Intelligent Manufacturing-oriented Production Scheduling System International Journal of Automation and Computing 7(4), November 2010, 596-602 DOI: 10.1007/s11633-010-0545-1 Modeling of Agile Intelligent Manufacturing-oriented Production Scheduling System Zhong-Qi

More information

A Practical Approach Using Decision Management and Decision Modeling at The Principal

A Practical Approach Using Decision Management and Decision Modeling at The Principal Building Business Capability (BBC) 2013 A Practical Approach Using Decision Management and Decision Modeling at The Principal Doris Kimball and Don Perkins Welcome and Introduction Doris Kimball Senior

More information

Developing Connected Products - What s needed? Driven to enable your success!

Developing Connected Products - What s needed? Driven to enable your success! Developing Connected Products - What s needed? Driven to enable your success! What s a Connected Product Smart, connected products are products, assets and other things embedded with processors, sensors,

More information

MOT Seminar. John Musacchio 4/16/09

MOT Seminar. John Musacchio 4/16/09 Game Theory MOT Seminar John Musacchio johnm@soe.ucsc.edu 4/16/09 1 Who am I? John Musacchio Assistant Professor in ISTM Joined January 2005 PhD from Berkeley in Electrical l Engineering i Research Interests

More information